Option 2: Economic Espionage Forensic Report Economic espionage is a serious threat to U.S. companies that rely on innovation, according to the National Counterintelligence and Security Center’s 2018 report, Foreign Economic Espionage in Cyberspace. Based on the case you researched and analyzed in Modules 2 and 4, write revised policies in response to the economic espionage attack. Be sure to include in your assignment:


Module 8
Readings
· Chapter 12 in Guide to Computer Forensics and Investigations
· Saleem, S., Popov, O., & Baggili, I. (2016). A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. Digital Investigation, 16, S55-S64.
· Wilson, R., & Chi, H. (2018). A framework for validating aimed mobile digital forensics evidences.
Proceedings of the ACMSE 2018 Conference, 1-8.
Opening Exercise (0 points) Discussion (25 points) Mastery Exercise (10 points) Portfolio Project (275 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.

Option 1: Job Candidate Final Report

For this Portfolio Project, you will work with forensic software to analyze a disk image for electronic evidence to make the hiring decision. You will analyze the forensic data and write a detailed report, following this format:

• Abstract
• Table of Contents
• Body of Report
• Conclusion
• References
• Glossary
• Acknowledgements
• Appendixes

Refer to Chapter 14 in Guide to Computer Forensics and Investigations: Processing Digital Evidence for descriptions of each section of the report.

Be sure to include in your report:

• A detailed analysis of the evidence within the body.
• A recommendation about the hiring of the job candidate in the conclusion.
• Raw data in the appendixes.
• Proof of your discovery i.e. screenshots or other exported information from the disk image.
• Lessons learned about computer forensics in the acknowledgement.

In addition to the report requirements above, your report must meet these requirements as well:

• 8-10 pages in length, not including the cover page and reference page.

• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well written using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.
• Support your report with at least four peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.

Refer to the Portfolio Project Rubric in Module 8 for more information on expectations for this assignment.

Option 2: Economic Espionage Forensic Report

Economic espionage is a serious threat to U.S. companies that rely on innovation, according to the National Counterintelligence and Security Center’s 2018 report, Foreign Economic Espionage in Cyberspace.

Based on the case you researched and analyzed in Modules 2 and 4, write revised policies in response to the economic espionage attack.

Be sure to include in your assignment:

1. Background information about case
a. A profile of the organization
b. When the incident occurred
c. What happened as a result of the attack
2. What the organization must protect
3. Potential threats to security
4. User responsibilities
5. Monitoring of the computer systems
6. Access controls
7. Penalties for violation

Your paper must meet the following requirements:

• 8-10 pages in length, not including the cover page and reference page.
• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well-written using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.
• Support your paper with at least four peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.

Refer to the Portfolio Project Rubric in Module 8 for more information on expectations for this assignment.

COURSE POLICIES

Course Grading

20% Discussion Participation
0% Opening Exercises
0% Live Classroom
8% Mastery Exercises
37% Critical Thinking Assignments 35% Final Portfolio Project

IN-CLASSROOM POLICIES

For information on late work and incomplete grade policies, please refer to our In-Classroom Student Policies and Guidelines or the Academic Catalog for comprehensive documentation of CSU-Global institutional policies.
Academic Integrity
Students must assume responsibility for maintaining honesty in all work submitted for credit and in any other work designated by the instructor of the course. Academic dishonesty includes cheating, fabrication, facilitating academic dishonesty, plagiarism, reusing /repurposing your own work (see CSU-Global Guide to Writing & APA for percentage of repurposed work that can be used in an assignment), unauthorized possession of academic materials, and unauthorized collaboration. The CSU-Global Library provides information on how students can avoid plagiarism by understanding what it is and how to use the Library and internet resources.

Citing Sources with APA Style
All students are expected to follow the CSU-Global Guide to Writing & APA when citing in APA (based on the most recent APA style manual) for all assignments. A link to this guide should also be provided within most assignment descriptions in your course.

Disability Services Statement
CSU-Global is committed to providing reasonable accommodations for all persons with disabilities. Any student with a documented disability requesting academic accommodations should contact the Disability Resource Coordinator at 720-279-0650 and/or email ada@CSUGlobal.edu for additional information to coordinate reasonable accommodations for students with documented disabilities.

Netiquette
Respect the diversity of opinions among the instructor and classmates and engage with them in a courteous, respectful, and professional manner. All posts and classroom communication must be conducted in accordance with the student code of conduct. Think before you push the Send button. Did you say just what you meant?
How will the person on the other end read the words?

Maintain an environment free of harassment, stalking, threats, abuse, insults, or humiliation toward the instructor and classmates. This includes, but is not limited to, demeaning written or oral comments of an ethnic, religious, age, disability, sexist (or sexual orientation), or racist nature; and the unwanted sexual advances or intimidations by email, or on discussion boards and other postings within or connected to the online classroom. If you have concerns about something that has been said, please let your instructor know.



This essay is written by:

Prof. Sykes Verified writer

Finished papers: 435

Proficient in:

English, History, Business and Entrepreneurship, Nursing, Psychology, Management

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer
© 2017 theacademicessays. All Rights Reserved. Design & Developed by theacademicessays.
How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Have A QUESTION?

Click Here to get instant solution!
X myStickymenu
Loading...